Results 41 to 50 of about 4,651 (205)
Location-Based Beamforming for Rician Wiretap Channels
We propose a location-based beamforming scheme for wiretap channels, where a source communicates with a legitimate receiver in the presence of an eavesdropper.
Liu, Chenxi, Malaney, Robert
core +1 more source
Optimal Beamforming for Physical Layer Security in MISO Wireless Networks [PDF]
A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped with multiple antennas while the users and eavesdropper are equipped with a single antenna, is considered.
Duong, Trung Q. +3 more
core +2 more sources
On the Analysis of Secrecy Outage Probability Using Average Channel Capacity
In this article, we analyze the outage probability of physically secure wireless signal transmission in fading envi-ronments where both primary and eavesdropper channels are subject to generalized fading. We propose a novel approach using the average channel capacity of the primary channel and that of the eavesdropper channel to the outage probability ...
openaire +5 more sources
Physical Layer Security Enhancement of Space-Time Block Code Using Channel Prediction for Antenna Selection [PDF]
Aiming at Transmit Antenna Selection with Delay(TASD)/Orthogonal Space-Time Block Code(OSTBC) wireless communication system,this paper proposes a system physical layer security enhancement scheme based on the Minimum Mean Square Error(MMSE) channel ...
QIAN Hui, LI Guangqiu, WANG Lingbo, CAI Jianhui
doaj +1 more source
Location-Based Beamforming and Physical Layer Security in Rician Wiretap Channels
We propose a new location-based beamforming (LBB) scheme for wiretap channels, where a multi-antenna source communicates with a single-antenna legitimate receiver in the presence of a multi-antenna eavesdropper.
Liu, Chenxi, Malaney, Robert
core +1 more source
A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly,the secrecy outage probability in the worst case was derived and a transmission power ...
Ya-jun CHEN +3 more
doaj +2 more sources
The secrecy outage performance for a cooperative cognitive radio energy‐harvesting network is analyzed. The cognitive network is composed of an energy‐constrained cognitive source (CS), multiple energy‐constrained cognitive relays (CRs) and a cognitive ...
Yujie Zhang +3 more
doaj +1 more source
On the secrecy performance of RIS-enabled wireless communications over Nakagami-m fading channels
This paper examines the secrecy performance of reconfigurable intelligent surface aided wireless communication systems. Specifically, we derive the secrecy outage probability (SOP), intercept probability, probability of non-zero secrecy capacity, and ...
Ashutosh K. Yadav +3 more
doaj +1 more source
Outage Constrained Robust Secure Transmission for MISO Wiretap Channels [PDF]
In this paper we consider the robust secure beamformer design for MISO wiretap channels. Assume that the eavesdroppers' channels are only partially available at the transmitter, we seek to maximize the secrecy rate under the transmit power and secrecy ...
Hong, Mingyi +4 more
core
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source

